{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T08:18:46Z","timestamp":1767860326949,"version":"3.49.0"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100003836","name":"IDEC","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003836","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF2017R1A2B2005416"],"award-info":[{"award-number":["NRF2017R1A2B2005416"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003662","name":"Korea Evaluation Institute of Industrial Technology","doi-asserted-by":"publisher","award":["10077609"],"award-info":[{"award-number":["10077609"]}],"id":[{"id":"10.13039\/501100003662","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2967217","type":"journal-article","created":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T21:06:26Z","timestamp":1579295186000},"page":"17366-17377","source":"Crossref","is-referenced-by-count":33,"title":["CAT-TWO: Counter-Based Adaptive Tree, Time Window Optimized for DRAM Row-Hammer Prevention"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2125-0573","authenticated-orcid":false,"given":"Ingab","family":"Kang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2739-2924","authenticated-orcid":false,"given":"Eojin","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1733-1394","authenticated-orcid":false,"given":"Jung Ho","family":"Ahn","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2019.2897299"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.16"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2015.7056058"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317866"},{"key":"ref10","year":"2012"},{"key":"ref11","year":"2013"},{"key":"ref12","year":"2014"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155624"},{"key":"ref14","author":"keeth","year":"2008","journal-title":"DRAM Circuit Design"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2014.2332177"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2907248"},{"key":"ref17","article-title":"Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors","author":"kim","year":"2014","journal-title":"Proc ACM\/IEEE 41st Int Symp Comput Archit (ISCA)"},{"key":"ref18","article-title":"RAMBleed: Reading bits in memory without accessing them","author":"kwong","year":"2020","journal-title":"Proc IEEE Symp Secur Privacy (SP)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322232"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605403"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.30"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00057"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-981-10-1387-4_6","author":"bhattacharya","year":"2018","journal-title":"Fault Tolerant Architectures for Cryptography and Hardware Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1241601.1241618"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062281"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"ref8","author":"horiguchi","year":"2013","journal-title":"Nanoscale Memory Repair"},{"key":"ref7","article-title":"These are not your grand Daddys CPU performance counters&#x2014;CPU hardware performance counters for security","author":"herath","year":"2015","journal-title":"Proc Black Hat Briefings"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417540"},{"key":"ref9","author":"jacob","year":"2007","journal-title":"Memory Systems Cache DRAM Disk"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2013.6557148"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2017.2787674"},{"key":"ref22","article-title":"RowHammer: A retrospective","author":"mutlu","year":"0","journal-title":"IEEE Trans Comput -Aided Des Integr Circuits Syst"},{"key":"ref21","year":"2016","journal-title":"DDR3 SDRAM System-Power Calculator"},{"key":"ref24","first-page":"1","article-title":"Flip Feng Shui: Hammering a needle in the software stack","author":"razavi","year":"2016","journal-title":"Proc Usenix Secur Symp"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.7"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2016.2614497"},{"key":"ref25","article-title":"Exploiting the DRAM Rowhammer bug to gain kernel privileges","author":"seaborn","year":"2015","journal-title":"Proc Black Hat Briefings"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/08962085.pdf?arnumber=8962085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T20:00:52Z","timestamp":1643313652000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8962085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2967217","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}